Yina et al., 2022 - Google Patents
Discussion on computer network security technology and firewall technologyYina et al., 2022
View PDF- Document ID
- 252427122314756259
- Author
- Yina Q
- et al.
- Publication year
- Publication venue
- International Journal of New Developments in Engineering and Society
External Links
Snippet
With the continuous development of computer technology, network technology is deeply integrated into all aspects of society, and people's daily work, study and life have undergone tremendous changes. However, people also gradually realize that with the development of …
- 238000005516 engineering process 0 title abstract description 37
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110198297A (en) | Data on flows monitoring method, device, electronic equipment and computer-readable medium | |
Yina | Discussion on computer network security technology and firewall technology | |
Rashid et al. | Trust system architecture for securing GOOSE communication in IEC 61850 substation network | |
Zhang et al. | VOIP voice network technology security strategies | |
CN116318868A (en) | Cross-browser bill roaming method | |
CN109120619A (en) | A kind of computer network communications system | |
Anandappa et al. | Cloud computing and security issues in the cloud | |
Wu | The problems in campus network information security and its solutions | |
TWM602225U (en) | Information security blind spot detection system for normal network behavior | |
Singh et al. | A hybrid model for cyberspace security | |
Tang et al. | Research on security protection countermeasures of internet of things | |
Xia et al. | Research on the Application of Data Encryption Technology in Computer Network Communication Security | |
Zhang | Research of Campus Network Information Security | |
Li | Data and Information Security Technology in Network Communication | |
Liu | Research on Core Technology Based on Computer Information System Security Architecture | |
Kong et al. | Industrial Internet edge computing security risk analysis and protection research | |
Yi | The Network Security Analysis System Design Based on B/S Structure: An Approach Research | |
Yu | Study on intrusion IPv6 detection system on LINUX | |
Zhao | Research on Database Information Transmission Security Protection System under Computer Big Data Technology | |
Yang et al. | Security Risk Analysis of On-Site Terminal of Marketing Specialty in Power Industry under the Environment of Internet of Things | |
YanWei et al. | Research on Power Enterprise Network Security Solution | |
CN118199943A (en) | High-expansibility network security host | |
Zhou et al. | The Firewall Rule Authentication Method Based on 6to4 Tunnel | |
Zou et al. | Research on Security Risk Analysis and Protective Measures of Power Internet of Things | |
Ma et al. | Information security protection in hybrid office |